KEM-DEM

A universally composable secure channel based on the KEM-DEM framework. For ISO standards on public-key encryption, Shoup introduced the framework of KEM (Key Encapsulation Mechanism), and DEM (Data Encapsulation Mechanism), for formalizing and realizing one-directional hybrid encryption; KEM is a formalization of asymmetric encryption specified for key distribution, and DEM is a formalization of symmetric encryption. This paper investigates a more general hybrid protocol, secure channel, using KEM and DEM, such that KEM is used for distribution of a session key and DEM, along with the session key, is used for multiple bi-directional encrypted transactions in a session. This paper shows that KEM semantically secure against adaptively chosen ciphertext attacks (IND-CCA2) and DEM semantically secure against adaptively chosen plaintext/ciphertext attacks (IND-P2-C2) along with secure signatures and ideal certification authority are sufficient to realize a universally composable (UC) secure channel. To obtain the main result, this paper also shows several equivalence results: UC KEM, IND-CCA2 KEM and NM-CCA2 (non-malleable against CCA2) KEM are equivalent, and UC DEM, IND-P2-C2 DEM and NM-P2-C2 DEM are equivalent.


References in zbMATH (referenced in 56 articles )

Showing results 1 to 20 of 56.
Sorted by year (citations)

1 2 3 next

  1. Watanabe, Yohei; Shikata, Junji: Timed-release computational secret sharing and threshold encryption (2018)
  2. Camenisch, Jan; Derler, David; Krenn, Stephan; Pöhls, Henrich C.; Samelin, Kai; Slamanig, Daniel: Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures (2017)
  3. Bansal, Tarun Kumar; Chang, Donghoon; Sanadhya, Somitra Kumar: Sponge based CCA2 secure asymmetric encryption for arbitrary length message (2015)
  4. Fujisaki, Eiichiro; Okamoto, Tatsuaki: Secure integration of asymmetric and symmetric encryption schemes (2013)
  5. Li, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi: Certificateless hybrid signcryption (2013)
  6. Fujisaki, Eiichiro: New constructions of efficient simulation-sound commitments using encryption and their applications (2012)
  7. Libert, Beno{^i}t; Paterson, Kenneth G.; Quaglia, Elizabeth A.: Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model (2012)
  8. Naor, Moni; Segev, Gil: Public-key cryptosystems resilient to key leakage (2012)
  9. Yoneyama, Kazuki: One-round authenticated key exchange with strong forward secrecy in the standard model against constrained adversary (2012)
  10. Paterson, Kenneth G.; Schuldt, Jacob C. N.; Stam, Martijn; Thomson, Susan: On the joint security of encryption and signature, revisited (2011)
  11. Shibuya, Yuki; Shikata, Junji: Constructing secure hybrid encryption from key encapsulation mechanism with authenticity (2011)
  12. Abe, Masayuki; Cui, Yang; Imai, Hideki; Kiltz, Eike: Efficient hybrid encryption from ID-based encryption (2010)
  13. Desmedt, Yvo; Gennaro, Rosario; Kurosawa, Kaoru; Shoup, Victor: A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack (2010)
  14. Herranz, Javier; Hofheinz, Dennis; Kiltz, Eike: Some (in)sufficient conditions for secure hybrid encryption (2010)
  15. Kiltz, Eike; Mohassel, Payman; O’Neill, Adam: Adaptive trapdoor functions and chosen-ciphertext security (2010)
  16. Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Kou, Weidong: Efficient CCA-secure PKE from identity-based techniques (2010)
  17. Long, Yu; Chen, Kefei: Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism (2010)
  18. Matsuda, Takahiro; Nakai, Yasumasa; Matsuura, Kanta: Efficient generic constructions of timed-release encryption with pre-open capability (2010)
  19. Wee, Hoeteck: Efficient chosen-ciphertext security via extractable hash proofs (2010)
  20. Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru: Toward an easy-to-understand structure for achieving chosen ciphertext security from the decisional Diffie-Hellman assumption (2010)

1 2 3 next